Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ServiceNow > Certified Implementation Specialist > CIS-Discovery

CIS-Discovery Certified Implementation Specialist - Discovery Question and Answers

Question # 4

CI identifiers can be viewed under which of the following?

A.

Discovery Dashboard

B.

CI Class Manager

C.

Process Handlers

D.

Processes and Classification

E.

CI record

Full Access
Question # 5

Which choice best describes the Reconciliation process?

A.

The process of reconciling a deleted Cl, if it is identified as a duplicate. The result is stored in de-duplication tasks.

B.

The process of reconciling uniquely identifying Cis. to determine if the Cl already exists in the CMDB or if it is a newly discovered Cl.

C.

The process of reconciling Cis and Cl attributes by allowing only designated authoritative data sources to write to the CMDB at the Cl table and attribute level.

D.

The process of normalizing applications, to allow the data to be used by Software Asset Management.

Full Access
Question # 6

A network device has both an SSH port and an SNMP port open. Discovery tries the SSH probe first and it fails. This triggers the SNMP probe, which succeeds. Discovery uses SNMP first for subsequent discoveries on that device.

What discovery functionality allows the above to happen?

A.

Classification

B.

Credential affinity

C.

MID Server affinity

D.

IP service affinity

Full Access
Question # 7

What pattern operation allows the transfer of a file from the MID Server to a target?

A.

Parse file

B.

Create Connection

C.

Put file

D.

Manage Attachments

Full Access
Question # 8

Which of the below choices are possible options under ACTION ON ALL in the Recommended Actions pane for an Automated Error Messages list within Discovery > Home?

Choose 2 answers

A.

Make Ranges

B.

View instructions

C.

Ping IP Addresses

D.

Retry Discovery

Full Access
Question # 9

Which of the following executes the osquery commands on agents to gather attribute details from a CI?

A.

Agent Collector

B.

Agent listener

C.

ACC for Discovery

D.

Check Definitions

E.

Policies

Full Access
Question # 10

Which part of Agent Client Collector must be configured to run osquery commands on a CI?

  • Policies

A.

Credential-less Discovery

B.

Check

C.

ACC Websocket Endpoint

D.

Infrastructure Patterns

Full Access
Question # 11

What is the advantage of Discovery Range Sets?

A.

Range Sets provide flexibility in management and identification of known networks for simplicity of administration.

B.

Range Sets are the only way to have more than one IP Range defined within a Discovery Schedule.

C.

Range Sets show the number of IPs in a subnet.

D.

All the necessary Range Sets are installed in the base installation of Discovery.

Full Access
Question # 12

Which of the following choices may be global variables for steps in horizontal discovery patterns? (Choose two.)

A.

system

B.

computer_system

C.

process

D.

baseline

Full Access
Question # 13

Which choice allows the following functionality to occur?

If this value is set to 1000 and a discovery must scan 10,000 IP addresses using a single MID Server, it creates 10 Shazzam probes with each probe scanning 1000 IP addresses.

A.

MID Server Clusters

B.

MID Server selection method

C.

Shazzam Batch Size

D.

Behaviors

Full Access
Question # 14

Which of the following MID Server Parameters cannot be modified through the platform UI?

A.

mid.ssh.session_timeout

B.

url

C.

mid.windows.management_protocol

D.

name

Full Access
Question # 15

Hardware Models can have a one-to-many relationship with the following:

(Choose three.)

A.

Assets

B.

Manufacturer

C.

Configuration Items

D.

Product owner

E.

Model Categories

Full Access
Question # 16

What would you see in the Discovery pattern log that you would not see in the ECC Queue?

A.

Success or failure of the individual pattern steps

B.

Payload of CI attributes and relationships

C.

Shazzam probe payload

D.

Relationships created

Full Access
Question # 17

When is the Extension section in a horizontal pattern executed?

A.

As part of the post sensor processing script

B.

After the Identification sections

C.

As part of the port scan

D.

Before the Identification sections

Full Access
Question # 18

Which of the following can be used in the Debug Identification Section in Debug Mode for an infrastructure pattern? (Choose two.)

A.

IP

B.

AWS Endpoint

C.

PID

D.

Host Name

Full Access
Question # 19

Which of the below choices are benefits of Tracked Configuration Files? (Choose two.)

A.

Content version comparison

B.

Files tracked as CIs

C.

Unwanted files removed from target

D.

No credentials needed

Full Access
Question # 20

When configuring the MID Server Service Settings, which of the following is not a valid MID Server name?

A.

mymidserverl

B.

mid.serverl

C.

midserverl

D.

mid serverl

Full Access
Question # 21

One method for deleting specific CIs not discovered in 30 days is:

A.

Scheduled Job

B.

UI Policy

C.

Service Mapping

D.

Data Policy

Full Access
Question # 22

Which of the following must be configured to allow a MID Server to access servers using WinRM?

A.

Add the WinRM parameter on the target servers

B.

Add the MID Servers as a trusted source with DNS

C.

Add a MID Server parameter mid.windows.management protocol to use WinRM

D.

Set the JEA Property to True

Full Access
Question # 23

Using the SNMP Query operation on a pattern for a custom device query, it is best practice to do what?

A.

Modify the default MIB information

B.

Enable SSH as a secondary protocol

C.

Use live devices in production

D.

Use the publish manufacturer’s device MIB

Full Access
Question # 24

From the Discovery Status record, which of the following does a Device record contain?

A.

contains a link to the discovered Cl

B.

the contents of the discovered Cl

C.

contains a link to the discovered Asset

D.

the CMDB Health Dashboard link

Full Access
Question # 25

Discovery finds and maps dependencies for the following types of storage devices. (Choose three.)

A.

Direct-attached storage (DAS)

B.

Network-attached storage (NAS)

C.

Storage area network (SAN)

D.

Multiple area network (MAN)

E.

Redundant Array of Independent Disks (RAID)

Full Access
Question # 26

What operation is shown in this image? (has image took pic)

A.

Transform Table

B.

Put File

C.

Union Table

D.

Parse Variable

Full Access
Question # 27

Which metrics comprise the Completeness KPI for CMDB Health? (Choose two.)

A.

Required

B.

Recommended

C.

Audit

D.

Overall

Full Access
Question # 28

Which of the following fields are editable from a Merge Table pattern operation?

Choose 3 answers

A.

Target Table

B.

Second Table

C.

Primary Table

D.

First Table

Full Access
Question # 29

For a pattern operation, which of the below choices could be a valid replacement for <_>? (Choose three.)

$IfTable<_>.InstanceID

A.

[3]

B.

[X]

C.

[&]

D.

[.]

E.

[*]

F.

[]

Full Access
Question # 30

In a discovery pattern, which types are available with CI Attributes in the Pattern Designer? (Choose two.)

A.

Global CI types

B.

Main pattern CI type

C.

Related CI types

D.

All CI types

Full Access
Question # 31

Which choice best represents how to modify the functionality shown in this image?

A.

From a Classifier

B.

From a Discovery Pattern

C.

From the MID Server

D.

From a Probe

Full Access
Question # 32

Which of the following properties define the maximum overall size for the returned payload that comes from patterns?

A.

cmdb.properties.payload_max_size

B.

glide.discovery.payload_max

C.

mid.discovery.max_payload_size

D.

mid.discovery.max_pattern_payload_size

Full Access